Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Size: px
Start display at page:

Download "Endpoint Business Products Testing Report. Performed by AV-Test GmbH"

Transcription

1 Business Products Testing Report Performed by AV-Test GmbH January

2 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed a comparative review of six business security products to determine their real-world protection capabilities against threats that are encountered by businesses of all sizes every day. The test was designed to challenge the products against zero-day attacks from the internet, including the most common infection vectors currently. The samples were accessed via direct links to malicious executable files, by drive-by-download websites that utilize exploits and by opening mail attachments. Additionally, a static detection test of recent samples of two very prevalent malware families FakeAV and Zbot was carried out to show the detection capabilities of the products. Overall, delivered the best detection rates, coming top in both parts of the test detecting and blocking 96% of the zero-day threats, as well as blocking 99.74% of the prevalent malware samples. reached an equally good result for zero-day threats, also blocking 96%. The on-demand detection of prevelant malware was at 97.16%. Trend Micro and were very close to the top two products regarding the blocking of zero-day threats, both reached 92% here. Trend Micro had the second best ondemand detection rate of Zbot and FakeAV with 99.59%, reached 98.83%. Finally and were able to detect 80% of the zero-day threats and 91.38% () resp % () in case of the two prevalent malware families. The volume of new samples that anti-malware vendors have to process in order to protect their customers is creating problems. It is not always possible to deploy a signature for a certain binary in time. To combat this, security vendors provide additional functionalities that detect new threats from heuristics and generic detections, to URL blocking and exploit detection. These features can be used individually to protect against threats, however, due to the massive amount of malware threats and sources, as well as different behaviors. This test considers all of the protection mechanisms that are included in today s security software and challenges them against real-world threats in order to determine the real protection capabilities of the products. Products Tested The tests were carried out on the latest versions (at the time of the test) of each of the following 6 products: 6.0 Total for Trend Micro OfficeScan

3 Business Products Testing Report - Performed by AV-Test GmbH Test Results 1. Real-Time The best results for combined detection with all protection features turned on were achieved by and, both detecting 24 out of 25. and Trend Micro are only one threat behind with 23 detected samples. and detected 20 out of 25 tested URLs and s. i. URL blocking The test started by accessing malicious URLs and determined which products blocked access to the URLs and which didn t. This prevents malicious code from ever reaching the endpoint, minimizing the risk of getting infected. All vendors other than offer this feature Figure 1: Combined Detection (URL, Static or Dynamic) The best result was achieved by and Trend Micro who both blocked access to 17 out of 23 URLs. and were a bit behind with 13 and 12 blocked URLs respectively. blocked access to 2 URLs. However, it is important to note, that offers a protection feature called SmartScreen in the Internet Explorer which is also able to block access to malicious websites. This wasn t included in the test as our focus was on the protection features in the security software Figure 2: Blocked Access to Malicious URLs 2 0 3

4 Business Products Testing Report - Performed by AV-Test GmbH ii. Static detection In case the URL blocking fails or cannot be used, then traditional static malware detection becomes important. Therefore we tested the same 23 URLs again as well as the two malicious attachments with the on-demand scanner. All products tested provide this protection feature, as it is the traditional way of detecting and blocking malware. The best results were achieved by, detecting 19 out of 25 cases, closely followed by which detected 17 cases Detection of prevalent malware The second type of testing performed was the static detection of FakeAV and ZBot, two very prevalent malware families for many businesses today. and Trend Micro achieved the highest results detecting over 99% of the files for both test sets., and also had a very good detection rate with over 98% for FakeAV and over 92% for ZBot. was behind in this test, despite their in-the-cloud service, primarily because the sensitivity of this service is set to low in the default configuration to minimize the risk of false positives. This shows that you should always consider configuration settings and whether increasing protection rates will increase the risk of false positives or not % % Figure 3: Static detection of malware components iii. Dynamic detection 80% 70% 60% When both the URL filtering as well as the static file scanning fail and don t detect anything the malware could be executed on the system. At this point the third protection layer becomes important. This is the dynamic detection of threats, analyzing the behavior of the threat and blocking suspicious actions and removing related components. However it is not easy to test the dynamic detection separately (because the static detection would have to be artificially disabled), so the overall scores in figure 1 give an idea of the impact this has on the full protection rates. 50% Figure 4: Static detection results Fake AV ZBot 4

5 Business Products Testing Report - Performed by AV-Test GmbH Methodology Platform All tests have been performed on identical PCs equipped with the following hardware: The real-world blocking test was performed according to the methodology explained below: Intel Xeon Quad-Core X3360 CPU 4 GB Ram 500 GB HDD (Western Digital) Intel Pro/1000 PL (Gigabit Ethernet) NIC The operating system was Windows XP Service Pack 3 with updates as of Additionally, the following applications have been installed to provide a vulnerable system for the URLs that use exploits to infect the system. Developer Product Version Adobe Flash Player 10 ActiveX Adobe Flash Player 10 Plugin Adobe Acrobat Reader V8 or v9 ICQ ICQ Sun Java SE Runtime Environment 6 Update 1 Mozilla Firefox ( ) (en-us) Apple QuickTime Real Networks RealPlayer 10.5 WinZip Computing LP WinZip 10.0(6667) Yahoo! Inc Messenger Testing methodology The general pre-requisites were as follows: 1. Clean system for each sample. The test systems were restored to a clean state before being exposed to each malware sample. 2. Physical machines. The test systems used were actual physical machines. No Virtual Machines were used. 1. Sample introduction vector. Each sample should be introduced to the system in as realistic a method as possible. This will include sending samples that are collected as attachments in the real world as attachments to messages. Web-based threats are downloaded to the target systems from an external web server in a repeatable way. 2. Sample Cloud/Internet accessibility. If the malware uses the cloud/internet connection to reach other sites in order to download other files and infect the system, care should be taken to make sure that the cloud access is available to the malware sample in a safe way such that the testing network is not under the threat of getting infected. 3. Allow time for sample to run. Each sample should be allowed to run on the target system for 10 minutes to exhibit autonomous malicious behavior. This may include initiating connections to systems on the internet, or installing itself to survive a reboot (as may be the case with certain key-logging Trojans that only activate fully when the victim is performing a certain task). 4. Actions of the security software. If the security software prompts the user for a decision, always the same action shall be chosen. The action to be chosen should be removal or blocking, depending on what is being offered. 5. Recoding of the result. After the security software has finished all blocking or removal steps, the final system state is captured which allows to determine the success in detection, blocking and/or removing the threat by looking at the following points: a. Which network traffic has been allowed or blocked? b. Which modification to the file system have been allowed or blocked? c. Which modifications to the registry have been allowed or blocked? 3. Product configuration. All products were run with their default, out-of-the-box configuration and updated to their latest versions. The Internet was available to all tested products so they can use the cloud as part of their protection strategy. 5

6 Business Products Testing Report - Performed by AV-Test GmbH Appendix Version information of the tested software Developer, Distributor Product name Program version Engine/ signature version Lab (a) n/a Total for / / / 4.59G / bd Trend Micro OfficeScan / Samples The malware test corpus for the real-world protection test consisted of 25 samples, including direct downloads, driveby-downloads and malicious mail attachments. The samples were collected, analyzed and chosen by AV-Test. All samples have been tested at the same day they were discovered by AV-Test to ensure that only the latest threats are used. The test corpus for the static detection test consisted of 6,059 samples of the FakeAV and ZBot families. The samples were collected during a time frame of 6 weeks before starting the test. The analysis of the files and the decision which files shall be included in the test set was made by AV-Test. List of malware samples for the real-world test URLs Malicious attachments DHL Delivery Problem S.NR Facebook Service. Your password has been 6

7 Business Products Testing Report - Performed by AV-Test GmbH Copyright 2010 by AV-Test GmbH, Klewitzstr. 7, Magdeburg, Germany Phone +49 (0) Fax +49 (0) Web

Real World Testing Report

Real World Testing Report Real World Testing Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: July 30 th, 2012, last update: July 30 th, 2012 Executive Summary In July 2012, AV-Test

More information

Windows 8 Malware Protection Test Report

Windows 8 Malware Protection Test Report Windows 8 Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: January 11 th, 2013, last update: January 11 th, 2013 Executive Summary In

More information

Banker Malware Protection Test Report

Banker Malware Protection Test Report Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test

More information

Real World and Vulnerability Protection, Performance and Remediation Report

Real World and Vulnerability Protection, Performance and Remediation Report Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:

More information

Proactive Rootkit Protection Comparison Test

Proactive Rootkit Protection Comparison Test Proactive Rootkit Protection Comparison Test A test commissioned by McAfee and performed by AV-TEST GmbH Date of the report: February 2 th, 213 Executive Summary In January 213, AV-TEST performed a comparative

More information

Kaspersky Internet Security 2013 Test Report

Kaspersky Internet Security 2013 Test Report Kaspersky Internet Security 2013 Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: August 31 st, 2012, last update: August 31 st, 2012 Executive Summary

More information

Remediation Testing Report

Remediation Testing Report Remediation Testing Report A test commissioned by Enigma Software Group and performed by AV-Test GmbH Date of the report: May 19 th, 2016, last update May 24 th, 2016 Executive Summary In April and May

More information

Virtual Environment Protection Test Report

Virtual Environment Protection Test Report Virtual Environment Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: May 10 th, 2012, last update: May 14 th, 2012 Executive Summary In March

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

Zscaler Cloud Web Gateway Test

Zscaler Cloud Web Gateway Test Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the

More information

McAfee Web Gateway Security Appliance Test

McAfee Web Gateway Security Appliance Test McAfee Web Gateway Security Appliance Test A test commissioned by McAfee, Inc. and performed by AV-TEST GmbH Date of the report: January 24 th, 2013 (last update: February 20 th, 2013) Executive Summary

More information

Exploit Protection on Windows XP

Exploit Protection on Windows XP Exploit Protection on Windows XP A test commissioned by Tencent and performed by AV-TEST GmbH Date of the report: July 17 th, 2014 1 Content Executive Summary... 3 Detailed Test Report... 4 Test Environment

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Exploit Protection on Windows XP

Exploit Protection on Windows XP Exploit Protection on Windows XP A test commissioned by Qihoo 360 and performed by AV-TEST GmbH Date of the report: April 30 th, 2014 1 Content Executive Summary... 3 Detailed Test Report... 4 Test Environment

More information

Exploit Protection on Windows XP

Exploit Protection on Windows XP Exploit Protection on Windows XP A test commissioned by Tencent and performed by AV-TEST GmbH Date of the report: November 21 st, 2014 1 Content Executive Summary... 3 Detailed Test Report... 4 Test Environment

More information

Real World Enterprise Endpoint Test Report

Real World Enterprise Endpoint Test Report Real World Enterprise Endpoint Test Report A test commissioned by Trend Micro and performed by AV-Test GmbH Executive Summary In May 2011, AV-Test.org performed endpoint security benchmark testing on five

More information

Patch Management Solutions Test

Patch Management Solutions Test Patch Management Solutions Test A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: 5 th June, 2013, last update: 19 th July, 2013 Executive Summary From May to July

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

MRG Effitas 360 Assessment & Certification Programme Q4 2014

MRG Effitas 360 Assessment & Certification Programme Q4 2014 MRG Effitas 360 Assessment & Certification Programme Q4 2014 1 Contents Introduction... 3 Executive summary... 3 Certification... 4 The purpose of this report... 5 Tests employed... 6 Security Applications

More information

Symantec Endpoint Protection 14.0

Symantec Endpoint Protection 14.0 Anti-Virus Comparative Symantec Endpoint Protection 14.0 Language: English October 2016 Last revision: 2 nd December 2016 http://www.av-comparatives.org http://www.mrg-effitas.com Commissioned by Symantec

More information

The overall result of the endurance test on Endpoint Security Suites carried out between March and August 2013:

The overall result of the endurance test on Endpoint Security Suites carried out between March and August 2013: 8th October 2013 created by Markus Selinger 9 Endpoint Security Suites Complete an Endurance Test on Consistent Security Between March and August 2013, the AV-TEST experts permanently tested 9 solutions

More information

Network Threat Detection

Network Threat Detection Network Threat Detection DECEMBER 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of a selection of threat detection

More information

Quick Heal AntiVirus Pro. Tough on Malware, Light on your PC.

Quick Heal AntiVirus Pro. Tough on Malware, Light on your PC. Tough on Malware, Light on your PC. Features List Quick Heal With its Improved Virus Scan Engine, Quick Heal scans your PC thoroughly without making it slow. Advanced DNAScan The ingenious Quick Heal DNAScan

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus OCTOBER - DECEMBER 2012 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security

More information

McAfee Advanced Threat Defense 3.0

McAfee Advanced Threat Defense 3.0 Release Notes McAfee Advanced Threat Defense 3.0 Revision A Contents About this document Features of McAfee Advanced Threat Defense 3.0 Resolved Issues Installation and upgrade notes Known Issues Find

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Third-Party Patches Product List Below is a list of third-party applications supported by Holoweb Desktop and Server Agents.

Third-Party Patches Product List Below is a list of third-party applications supported by Holoweb Desktop and Server Agents. Third-Party Patches Product List Below is a list of third-party applications supported by Holoweb Desktop and Server Agents. Microsoft Windows Adobe Acrobat Application Adobe Acrobat 8 Professional - English,

More information

Kaspersky Whitelisting Database Test

Kaspersky Whitelisting Database Test Kaspersky Whitelisting Database Test A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: February 14 th, 2013, last update: April 4 th, 2013 Summary During November 2012

More information

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security

More information

Software Updater Keep known vulnerabilities out of your system

Software Updater Keep known vulnerabilities out of your system Software Updater Keep known vulnerabilities out of your system Version 1-04 July 2016 SOFTWARE UPDATER SUMMARY This whitepaper explains software updates as an integral part of endpoint protection. F-Secure

More information

A Best Practice Approach to Third Party Patching

A Best Practice Approach to Third Party Patching A Best Practice Approach to Third Party Patching Mike Grueber Senior Product Manager 1 Effective patch management is essential 90% of successful attacks occurred against previously known vulnerabilities

More information

KASPERSKY LAB S AUTOMATIC EXPLOIT PREVENTION TECHNOLOGY. Be Ready for What s Next.

KASPERSKY LAB S AUTOMATIC EXPLOIT PREVENTION TECHNOLOGY. Be Ready for What s Next. KASPERSKY LAB S AUTOMATIC EXPLOIT PREVENTION TECHNOLOGY Be Ready for What s Next www.kaspersky.com 2 1. THE NEW INSIDER THREAT Third party applications accounted for a massive 87 % of vulnerabilities in

More information

Panda Antivirus Pro Accurate Reviews, Rankings By Qualified App Testers Worldwide

Panda Antivirus Pro Accurate Reviews, Rankings By Qualified App Testers Worldwide PROS: Includes optional firewall and virtual-machine safe browser. USB Vaccination permanently prevents USB-based malware attacks. Checks for missing Windows patches. CONS: So-so scores in PCMag's malware

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus Protection JAN - MAR 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Seqrite Essential enterprise security for every connected endpoint SME Edition Product Highlights A must-have endpoint security solution that provides the best

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products

More information

Trend Micro OfficeScan 11.0

Trend Micro OfficeScan 11.0 Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus JULY - SEPTEMBER 2012 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Kaspersky Anti-Virus for Mac. Reviewer s Guide

Kaspersky Anti-Virus for Mac. Reviewer s Guide Kaspersky Anti-Virus for Mac Reviewer s Guide Table of contents 1 Introduction... 3 2 Key advantages... 4 2.1 An integrated approach to computer protection 4 2.2 Intelligent allocation of resources 4 2.3

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection JULY - SEPTEMBER 2012 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus Protection APRIL - JUNE 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to

More information

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 SP1 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Business Edition Product Highlights Innovative endpoint security that prevents data leakage,

More information

Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014).

Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014). 18th September 2014 created by Markus Selinger Mac OS X in the Crosshairs 18 Malware Scanners Put to the Test For a long time, Mac OS users believed they were safe, that there was no malware for their

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

CRYPTOLOCKERS AND OTHER FILECODERS

CRYPTOLOCKERS AND OTHER FILECODERS CRYPTOLOCKERS AND OTHER FILECODERS Cryptolockers and other Filecoders (file-encrypting ransomware) Ransomware is any malware (malicious software) used by cyber criminals to hold digital files on smartphones,

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Whole Product Dynamic Test Protection Offered by Internet Security Suites Language: English December 2009 Last Revision: 16 th December 2009 www.av-comparatives.org Table of Contents

More information

Enterprise Anti-Virus Protection

Enterprise Anti-Virus Protection Enterprise Anti-Virus Protection OCT - DEC 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products

More information

Virtual Desktop Anti-malware Protection

Virtual Desktop Anti-malware Protection Virtual Desktop Anti-malware Protection A COMPARATIVE TEST BETWEEN SYMANTEC ENDPOINT PROTECTION AND TREND MICRO DEEP SECURITY Dennis Technology Labs, 05/04/2012 www.dennistechnologylabs.com This report

More information

Plato Courseware v3 Systems and Configuration Requirements For Workstations July 13, 2015

Plato Courseware v3 Systems and Configuration Requirements For Workstations July 13, 2015 Plato Courseware v3 Systems and Configuration Requirements For Workstations July 13, 2015 1 Content About This Document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection JULY - SEPT 2015 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection OCT - DEC 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

IBM Tivoli Endpoint Manager for Core Protection

IBM Tivoli Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Protecting endpoints from malware and other malicious threats Highlights Delivers real-time endpoint protection against viruses, Trojan horses, spyware, rootkits

More information

EPC- ENTERPRISE SERVER - SYS REQ S. Deploying EPC 9.x

EPC- ENTERPRISE SERVER - SYS REQ S. Deploying EPC 9.x EPC- ENTERPRISE SERVER - SYS REQ S Deploying EPC 9.x Disclaimer 1 Disclaimer Copyright (c) 2016 Interfacing Technologies Corporation. All rights reserved. This document, as well as the software described

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection JANUARY - MARCH 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Small Business Anti-Virus Protection

Small Business Anti-Virus Protection Small Business Anti-Virus Protection JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Testoffree malware scanners

Testoffree malware scanners Checkingtheefectivenessofso-caled on-demandmalwarescannersforthreatdetection isaveryspecifictest. Nowadays,bothindividualuserandenterpriseoften useapplicationspresentedinthisreport.theirrole remainsunchanged

More information

Closing the Antivirus Protection Gap

Closing the Antivirus Protection Gap A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years

More information

escan Antivirus Technology

escan Antivirus Technology escan Antivirus Technology White Paper Document Version ( esnav 14.0.0.1) Creation Date: 19 th Feb, 2013 Antivirus Technology The complexity of anti-virus software has grown enormously over the last few

More information

Real World Protection and Remediation Testing Report

Real World Protection and Remediation Testing Report Real World Protection and Remediation Testing Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: August 9 th, 2012, last update: August 9 th, 2012 Executive

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JANUARY - MARCH 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security

More information

Ransomware Protection in Windows 10 Anniversary Update

Ransomware Protection in Windows 10 Anniversary Update Ransomware Protection in Windows 10 Anniversary Update This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Business Edition Product Highlights Proactive endpoint security that allows you to monitor

More information

Get Started Guide - PC Tools AntiVirus free

Get Started Guide - PC Tools AntiVirus free Get Started Guide - PC Tools AntiVirus free Table of Contents PC Tools AntiVirus Free... 1 Getting Started with PC Tools AntiVirus Free... 1 Installing... 1 Getting Started... 1 iii PC Tools AntiVirus

More information

Minimum & Recommended Platform Requirements. PC Macintosh PC Windows PC Vista* Macintosh OS X OS (until 06/08) 2000 Pro or XP

Minimum & Recommended Platform Requirements. PC Macintosh PC Windows PC Vista* Macintosh OS X OS (until 06/08) 2000 Pro or XP Supported Platforms Technical Reference September 26, 2007 This document outlines the platforms supported for general use of Infinite Campus software. Campus currently supports the Windows and Macintosh

More information

System Requirements. Version 6.2

System Requirements. Version 6.2 System Requirements Version 6.2 Contents System Requirements Overview... 3 Information Technology Staff Requirements... 3 Standard Hardware Specifications... 4 Standard Configuration and Usage Parameters...

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.

More information

Trend Micro Endpoint Comparative Report Performed by AV-Test.org

Trend Micro Endpoint Comparative Report Performed by AV-Test.org Comparative Report Performed by AV-Test.org Results from June 2010 Executive Summary In June of 2010, AV-Test.org performed endpoint security benchmark testing on five marketleading Enterprise endpoint

More information

Quick Heal Internet Security Premium. Bank, chat, , and browse online with round-the-clock security.

Quick Heal Internet Security Premium. Bank, chat,  , and browse online with round-the-clock security. Premium Bank, chat, email, and browse online with round-the-clock security. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware tools.

More information

PC Anti-Malware Protection 2015

PC Anti-Malware Protection 2015 PC Anti-Malware Protection 2015 A DYNAMIC ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness

More information

Hitman Pro 3 Real-World Malware Statistics

Hitman Pro 3 Real-World Malware Statistics Hitman Pro 3 Real-World Malware Statistics October/November 2009 Hitman Pro 3 Real-World Malware Statistics October/November 2009 Page 1 Table of Contents Introduction to Hitman Pro... 3 Extensive Virus

More information

Kaspersky Lab report: Global Web Browser Usage and Security Trends

Kaspersky Lab report: Global Web Browser Usage and Security Trends Kaspersky Lab report: Global Web Browser Usage and Security Trends November, 2012 Overview Browsers can be regarded as a kind of autonomous zone inside the operating systems of modern computers. A browser

More information

PassMark S O F T W A R E

PassMark S O F T W A R E PassMark S O F T W A R E Norton 360 v4 Startup Manager Windows XP, Windows Vista and Windows 7 Document: Norton 360 v4 Startup Manager and Report Author: D. Wren, K. Lai Company: PassMark Software Date:

More information

IT Security Cost Reduction

IT Security Cost Reduction Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint In the constant drive for increased productivity and cost effectiveness, enterprises are continuously

More information

Home Anti-Virus Protection

Home Anti-Virus Protection Home Anti-Virus Protection JULY - SEPTEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware

More information

Whole Product Real World Dynamic Protection Test (August November) 2011

Whole Product Real World Dynamic Protection Test (August November) 2011 Whole Product Real-World Dynamic Protection Test August-November 2011 Language: English December 2011 Last revision: 16 th December 2011 www.av-comparatives.org 1 Content Introduction... 3 Test Procedure...

More information

Current Trends in Web Security Attacks and Best Practices to Stop Them

Current Trends in Web Security Attacks and Best Practices to Stop Them Current Trends in Web Security Attacks and Best Practices to Stop Them Presented by Terry Leung 大 中 華 區 技 術 顧 問 July, 2011 Agenda Evolution of Web Threats & Crimeware Detailed Analysis of URL Filtering

More information

Avast PC Trends Report. January 2017 by Avast Software

Avast PC Trends Report. January 2017 by Avast Software Avast PC Trends Report January 2017 by Avast Software Contents A Introduction...2 B PC Insights & Analysis - Software...3 Installed programs...4 Out of date applications...5 The Top 10 least updated applications...6-7

More information

INFRASTRUCTURE HARDENING POLICY

INFRASTRUCTURE HARDENING POLICY INFORMATION SECURITY POLICY INFRASTRUCTURE HARDENING POLICY ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.0 Date: 6 th September

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud8 Administrator s Guide System Requirements Trend Micro Incorporated reserves the right to make changes to

More information

Endurance Test: Does antivirus software slow

Endurance Test: Does antivirus software slow 23rd April 2015 created by Markus Selinger Endurance Test: Does antivirus software slow down PCs? Critics maintain that protection software for Windows really puts the brakes on PCs. In a 14-month, extremely

More information

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a Getting started with VT6000 and VT6104 The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT performance of CANoe by distributing the real-time part of CANoe to a dedicated RT execution

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English April 2016 Last Revision: 23 th May 2016 Table of Contents 1. Introduction 3 2. Tested products

More information

Quick Heal Internet Security

Quick Heal Internet Security Quick Heal Internet Security Secure Browsing. Fast Detection. Cloud-Based Email Filtering. Feature List This solution eliminates the risk factors involved with online threats while you surf. It also makes

More information